vendor:
EDR-810 Series Secure Routers
by:
RandoriSec
4.3
CVSS
MEDIUM
Command Injection and Improper Access Control
78, 285
CWE
Product Name: EDR-810 Series Secure Routers
Affected Version From: 5.1 and prior
Affected Version To: 5.1 and prior
Patch Exists: YES
Related CWE: CVE-2019-10969, CVE-2019-10963
CPE: h:moxa:edr-810_series_secure_routers
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2018-10963/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-10963/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-10963/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-10963/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-10963/
Other Scripts:
N/A
Platforms Tested: Telnet, SSH, Webserver
2019
Moxa EDR-810 Series Secure Routers Vulnerabilities
An exploitable command injection vulnerability exists in the CLI functionality, which is provided by the Telnet and SSH services. An authenticated attacker (with admin or configadmin privileges) can abuse the ping feature to execute commands on the router. As the CLI is executed with root privileges, it is possible to obtain a root shell on the device. An unauthenticated attacker can retrieve all the log files (Firewall, IPSec and System) from the webserver. In order to exploit the issue, a legitimate user had to export the log files previously.
Mitigation:
Update to the latest version of Moxa EDR-810 Series Secure Routers